ATENTION‼ New - CVE-2019-19517
📖 Read
via "National Vulnerability Database".
Intelbras RF1200 1.1.3 devices allow CSRF to bypass the login.html form, as demonstrated by launching a scrapy process.📖 Read
via "National Vulnerability Database".
🔐 Cybercrimnals timed cyber attacks to spike during peak uncertainty about the coronavirus 🔐
📖 Read
via "Security on TechRepublic".
Mimecast's "100 Days of Coronavirus" report shows 33% overall increase in cyber threats ranging from malware to impersonation attacks.📖 Read
via "Security on TechRepublic".
TechRepublic
Cybercriminals timed attacks to spike during peak uncertainty about the coronavirus
Mimecast's "100 Days of Coronavirus" report shows 33% overall increase in cyber threats ranging from malware to impersonation attacks.
🕴 Breach Hits GoDaddy SSH Customers 🕴
📖 Read
via "Dark Reading: ".
The October 2019 breach left some customer data open to hacking eyes.📖 Read
via "Dark Reading: ".
Dark Reading
Breach Hits GoDaddy SSH Customers
The October 2019 breach left some customer data open to hacking eyes.
🔐 GoDaddy data breach shows why businesses need to better secure their customer data 🔐
📖 Read
via "Security on TechRepublic".
An unauthorized person was able to access the login credentials of a number of accounts with the hosting company.📖 Read
via "Security on TechRepublic".
TechRepublic
GoDaddy data breach shows why businesses need to better secure their customer data
An unauthorized person was able to access the login credentials of a number of accounts with the hosting company.
🕴 Attackers Adapt Techniques to Pandemic Reality 🕴
📖 Read
via "Dark Reading: ".
Over the past several months, threat actors have quickly shifted their tactics to take advantage of interest in the coronavirus, two studies find.📖 Read
via "Dark Reading: ".
Dark Reading
Attackers Adapt Techniques to Pandemic Reality
Over the past several months, threat actors have quickly shifted their tactics to take advantage of interest in the coronavirus, two studies find.
🕴 Microsoft Challenges Security Researchers to Hack Azure Sphere 🕴
📖 Read
via "Dark Reading: ".
Participants can earn up to $100,000 for finding severe flaws in Microsoft's Linux-based Azure Sphere IoT operating system.📖 Read
via "Dark Reading: ".
Darkreading
Microsoft Challenges Security Researchers to Hack Azure Sphere
Participants can earn up to $100,000 for finding severe flaws in Microsoft's Linux-based Azure Sphere IoT operating system.
ATENTION‼ New - CVE-2020-10634
📖 Read
via "National Vulnerability Database".
SAE IT-systems FW-50 Remote Telemetry Unit (RTU). A specially crafted request could allow an attacker to view the file structure of the affected device and access files that should be inaccessible.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2020-10630
📖 Read
via "National Vulnerability Database".
SAE IT-systems FW-50 Remote Telemetry Unit (RTU). The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in the output used as a webpage that is served to other users.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2019-20768
📖 Read
via "National Vulnerability Database".
ServiceNow IT Service Management Kingston through Patch 14-1, London through Patch 7, and Madrid before patch 4 allow stored XSS via crafted sysparm_item_guid and sys_id parameters in an Incident Request to service_catalog.do.📖 Read
via "National Vulnerability Database".
⚠ Adult live-streaming site CAM4 leaks millions of emails, private chats ⚠
📖 Read
via "Naked Security".
The leak exposed millions of records with full names, emails, user conversations, payment logs, and IP addresses dating back to March.📖 Read
via "Naked Security".
Naked Security
Adult live-streaming site CAM4 leaks millions of emails, private chats
The leak exposed millions of records with full names, emails, user conversations, payment logs, and IP addresses dating back to March.
⚠ Air gap security beaten by turning PC capacitors into speakers ⚠
📖 Read
via "Naked Security".
Researchers have poked another small hole in air gapped security by showing how the electronics inside computer power supply units (PSUs) can be turned into covert data transmission devices.📖 Read
via "Naked Security".
Naked Security
Air gap security beaten by turning PC capacitors into speakers
Researchers have poked another small hole in air gapped security by showing how the electronics inside computer power supply units (PSUs) can be turned into covert data transmission devices.
🔐 Big data: It's important to know where it is, how secure it is, and who is using it 🔐
📖 Read
via "Security on TechRepublic".
Track and monitor who has access, when it's accessed, and why, to keep it safe and use it to its full potential.📖 Read
via "Security on TechRepublic".
TechRepublic
Why big data tracking and monitoring is essential to security and optimization
In order to keep company data safe and use it to its full potential, follow these tips on tracking and monitoring data access and usage.
🔐 Apple and Google to prevent contact tracing apps from tracking your location 🔐
📖 Read
via "Security on TechRepublic".
The built-in technology would ban the use of GPS location data to monitor contact with people who test positive for COVID-19.📖 Read
via "Security on TechRepublic".
TechRepublic
Apple and Google to prevent contact tracing apps from tracking your location
The built-in technology would ban the use of GPS location data to monitor contact with people who test positive for COVID-19.
❌ Attackers Claim Identity of Financial NGO to Steal Sharepoint, Office Credentials ❌
📖 Read
via "Threatpost".
Investment brokers are the target of a new wave of socially engineered phishing attacks, warns FINRA.📖 Read
via "Threatpost".
Threat Post
Attackers Claim Identity of Financial NGO to Steal Sharepoint, Office Credentials
Investment brokers are the target of a new wave of socially engineered phishing attacks, warns FINRA.
🕴 Is CVSS the Right Standard for Prioritization? 🕴
📖 Read
via "Dark Reading: ".
More than 55% of open source vulnerabilities are rated high or critical. To truly understand a vulnerability and how it might affect an organization or product, we need much more than a number.📖 Read
via "Dark Reading: ".
Dark Reading
Is CVSS the Right Standard for Prioritization?
More than 55% of open source vulnerabilities are rated high or critical. To truly understand a vulnerability and how it might affect an organization or product, we need much more than a number.
🔐 Cybersecurity: Half of businesses have had remote working security scares 🔐
📖 Read
via "Security on TechRepublic".
The rapid move to remote working has left many businesses more vulnerable to cybersecurity threats, with nearly half saying they've encountered at least one scare as a direct result of the shift.📖 Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity: Half of businesses have had remote working security scares
The rapid move to remote working has left many businesses more vulnerable to cybersecurity threats, with nearly half saying they've encountered at least one scare as a direct result of the shift.
🔐 Security concerns intensify amid shift to remote working 🔐
📖 Read
via "Security on TechRepublic".
More than half of the professionals surveyed for Barracuda Networks said their workforce isn't properly trained to handle the risks associated with remote working.📖 Read
via "Security on TechRepublic".
TechRepublic
Security concerns intensify amid shift to remote working
More than half of the professionals surveyed for Barracuda Networks said their workforce isn't properly trained to handle the risks associated with remote working.
🔐 'Hackers Google people': Millions still using sports team, hometown, band, or child names as passwords 🔐
📖 Read
via "Security on TechRepublic".
Ahead of World Password Day, researchers are finding troubling trends despite numerous breaches and hacks.📖 Read
via "Security on TechRepublic".
TechRepublic
'Hackers Google people': Millions still using sports team, hometown, band, or child names as passwords
Ahead of World Password Day, researchers are finding troubling trends despite numerous breaches and hacks.
❌ Ransomware Attack Takes Down Toll Group Systems, Again ❌
📖 Read
via "Threatpost".
Australian transportation company Toll Group has been hit by the Nefilim ransomware, causing customers to experience delays.📖 Read
via "Threatpost".
Threat Post
Ransomware Attack Takes Down Toll Group Systems, Again
Australian transportation company Toll Group has been hit by a ransomware attack for the second time in three months, causing customers to experience delays.
ATENTION‼ New - CVE-2019-19169
📖 Read
via "National Vulnerability Database".
Dext5.ocx ActiveX 5.0.0.116 and eariler versions contain a vulnerability, which could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution.📖 Read
via "National Vulnerability Database".